A web application firewall inspects requests and filters those that are deemed malicious. In comparison, Client Reputation focuses on the source of the request, and determines the extent to which that source has sent malicious requests in the past. Register today for this upcoming webcast to find out more!

SC Magazine's SC Congress returns to London on 3 March, 2015 with an all new programme! Here is your chance to catch a full day of hard-hitting information security news and solutions from leaders in their industries that you can implement for your company.

As employees increasingly have mobile access to the corporate network this webcast will discuss the steps organisations can take to minimise risk among their workforce and detail what a mobile device management policy should look like and how to enforce it. Register today for this SC editorial webcast!

Cisco builds CCTV into ISRs

Cisco has built a CCTV module into its most popular branch office platform, which will enable businesses to roll out IP surveillance to their remote offices.

The networking giant has now sold in excess of 4million integrated services routers (ISRs). The two higher end models, the 2800 and the 3800, plus the ruggedised model, the 3200, have gained the module, Cisco said on Tuesday. The routers are now able to support both IP and analogue CCTV, with both wired and wireless cameras.

Images can be stored locally or sent across the network for centralised monitoring and storage. As with other features on the ISRs, CCTV can be configured remotely.

ADT, the physical security firm, will work with Cisco on the offering as a systems integrator.

"This will allow us to offer our customers the latest in physical security systems and services, taking advantage of existing systems," said Nick Samanich, a director of ADT.

Though the ISRs support non-IP cameras, Cisco is keen to migrate customers to IP equipment. Cisco offers its own IP cameras.

The new module permits the usual IP CCTV features such as pan, tilt and zoom, and embedded motion detection.

SC Magazine arms information security professionals with the in-depth, unbiased business and technical information they need to tackle the countless security challenges they face and establish risk management and compliance postures that underpin overall business strategies.